Compare commits
5 Commits
9ef0d35e81
...
9af211b0e8
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
9af211b0e8 | ||
|
|
d49e6cb528 | ||
|
|
300114138d | ||
|
|
c486df5259 | ||
| 21de2dd140 |
@ -1,26 +0,0 @@
|
|||||||
name: Check
|
|
||||||
|
|
||||||
on:
|
|
||||||
push:
|
|
||||||
branches: [main]
|
|
||||||
pull_request:
|
|
||||||
branches: [main]
|
|
||||||
|
|
||||||
jobs:
|
|
||||||
check:
|
|
||||||
runs-on: ubuntu-latest
|
|
||||||
steps:
|
|
||||||
- uses: actions/checkout@34e114876b0b11c390a56381ad16ebd13914f8d5 # v4
|
|
||||||
|
|
||||||
- uses: actions/setup-go@40f1582b2485089dde7abd97c1529aa768e1baff # v5
|
|
||||||
with:
|
|
||||||
go-version-file: go.mod
|
|
||||||
|
|
||||||
- name: Install golangci-lint
|
|
||||||
run: go install github.com/golangci/golangci-lint/v2/cmd/golangci-lint@5d1e709b7be35cb2025444e19de266b056b7b7ee # v2.10.1
|
|
||||||
|
|
||||||
- name: Install goimports
|
|
||||||
run: go install golang.org/x/tools/cmd/goimports@009367f5c17a8d4c45a961a3a509277190a9a6f0 # v0.42.0
|
|
||||||
|
|
||||||
- name: Run make check
|
|
||||||
run: make check
|
|
||||||
@ -1,5 +1,4 @@
|
|||||||
// Package notify provides notification delivery to Slack,
|
// Package notify provides notification delivery to Slack, Mattermost, and ntfy.
|
||||||
// Mattermost, and ntfy.
|
|
||||||
package notify
|
package notify
|
||||||
|
|
||||||
import (
|
import (
|
||||||
@ -8,7 +7,6 @@ import (
|
|||||||
"encoding/json"
|
"encoding/json"
|
||||||
"errors"
|
"errors"
|
||||||
"fmt"
|
"fmt"
|
||||||
"io"
|
|
||||||
"log/slog"
|
"log/slog"
|
||||||
"net/http"
|
"net/http"
|
||||||
"net/url"
|
"net/url"
|
||||||
@ -36,66 +34,8 @@ var (
|
|||||||
ErrMattermostFailed = errors.New(
|
ErrMattermostFailed = errors.New(
|
||||||
"mattermost notification failed",
|
"mattermost notification failed",
|
||||||
)
|
)
|
||||||
// ErrInvalidScheme is returned for disallowed URL schemes.
|
|
||||||
ErrInvalidScheme = errors.New("URL scheme not allowed")
|
|
||||||
// ErrMissingHost is returned when a URL has no host.
|
|
||||||
ErrMissingHost = errors.New("URL must have a host")
|
|
||||||
)
|
)
|
||||||
|
|
||||||
// IsAllowedScheme checks if the URL scheme is permitted.
|
|
||||||
func IsAllowedScheme(scheme string) bool {
|
|
||||||
return scheme == "https" || scheme == "http"
|
|
||||||
}
|
|
||||||
|
|
||||||
// ValidateWebhookURL validates and sanitizes a webhook URL.
|
|
||||||
// It ensures the URL has an allowed scheme (http/https),
|
|
||||||
// a non-empty host, and returns a pre-parsed *url.URL
|
|
||||||
// reconstructed from validated components.
|
|
||||||
func ValidateWebhookURL(raw string) (*url.URL, error) {
|
|
||||||
u, err := url.ParseRequestURI(raw)
|
|
||||||
if err != nil {
|
|
||||||
return nil, fmt.Errorf("invalid URL: %w", err)
|
|
||||||
}
|
|
||||||
|
|
||||||
if !IsAllowedScheme(u.Scheme) {
|
|
||||||
return nil, fmt.Errorf(
|
|
||||||
"%w: %s", ErrInvalidScheme, u.Scheme,
|
|
||||||
)
|
|
||||||
}
|
|
||||||
|
|
||||||
if u.Host == "" {
|
|
||||||
return nil, fmt.Errorf("%w", ErrMissingHost)
|
|
||||||
}
|
|
||||||
|
|
||||||
// Reconstruct from parsed components.
|
|
||||||
clean := &url.URL{
|
|
||||||
Scheme: u.Scheme,
|
|
||||||
Host: u.Host,
|
|
||||||
Path: u.Path,
|
|
||||||
RawQuery: u.RawQuery,
|
|
||||||
}
|
|
||||||
|
|
||||||
return clean, nil
|
|
||||||
}
|
|
||||||
|
|
||||||
// newRequest creates an http.Request from a pre-validated *url.URL.
|
|
||||||
// This avoids passing URL strings to http.NewRequestWithContext,
|
|
||||||
// which gosec flags as a potential SSRF vector.
|
|
||||||
func newRequest(
|
|
||||||
ctx context.Context,
|
|
||||||
method string,
|
|
||||||
target *url.URL,
|
|
||||||
body io.Reader,
|
|
||||||
) *http.Request {
|
|
||||||
return (&http.Request{
|
|
||||||
Method: method,
|
|
||||||
URL: target,
|
|
||||||
Host: target.Host,
|
|
||||||
Header: make(http.Header),
|
|
||||||
Body: io.NopCloser(body),
|
|
||||||
}).WithContext(ctx)
|
|
||||||
}
|
|
||||||
|
|
||||||
// Params contains dependencies for Service.
|
// Params contains dependencies for Service.
|
||||||
type Params struct {
|
type Params struct {
|
||||||
fx.In
|
fx.In
|
||||||
@ -107,7 +47,7 @@ type Params struct {
|
|||||||
// Service provides notification functionality.
|
// Service provides notification functionality.
|
||||||
type Service struct {
|
type Service struct {
|
||||||
log *slog.Logger
|
log *slog.Logger
|
||||||
transport http.RoundTripper
|
client *http.Client
|
||||||
config *config.Config
|
config *config.Config
|
||||||
ntfyURL *url.URL
|
ntfyURL *url.URL
|
||||||
slackWebhookURL *url.URL
|
slackWebhookURL *url.URL
|
||||||
@ -121,40 +61,32 @@ func New(
|
|||||||
) (*Service, error) {
|
) (*Service, error) {
|
||||||
svc := &Service{
|
svc := &Service{
|
||||||
log: params.Logger.Get(),
|
log: params.Logger.Get(),
|
||||||
transport: http.DefaultTransport,
|
client: &http.Client{
|
||||||
|
Timeout: httpClientTimeout,
|
||||||
|
},
|
||||||
config: params.Config,
|
config: params.Config,
|
||||||
}
|
}
|
||||||
|
|
||||||
if params.Config.NtfyTopic != "" {
|
if params.Config.NtfyTopic != "" {
|
||||||
u, err := ValidateWebhookURL(
|
u, err := url.ParseRequestURI(params.Config.NtfyTopic)
|
||||||
params.Config.NtfyTopic,
|
|
||||||
)
|
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, fmt.Errorf(
|
return nil, fmt.Errorf("invalid ntfy topic URL: %w", err)
|
||||||
"invalid ntfy topic URL: %w", err,
|
|
||||||
)
|
|
||||||
}
|
}
|
||||||
|
|
||||||
svc.ntfyURL = u
|
svc.ntfyURL = u
|
||||||
}
|
}
|
||||||
|
|
||||||
if params.Config.SlackWebhook != "" {
|
if params.Config.SlackWebhook != "" {
|
||||||
u, err := ValidateWebhookURL(
|
u, err := url.ParseRequestURI(params.Config.SlackWebhook)
|
||||||
params.Config.SlackWebhook,
|
|
||||||
)
|
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, fmt.Errorf(
|
return nil, fmt.Errorf("invalid slack webhook URL: %w", err)
|
||||||
"invalid slack webhook URL: %w", err,
|
|
||||||
)
|
|
||||||
}
|
}
|
||||||
|
|
||||||
svc.slackWebhookURL = u
|
svc.slackWebhookURL = u
|
||||||
}
|
}
|
||||||
|
|
||||||
if params.Config.MattermostWebhook != "" {
|
if params.Config.MattermostWebhook != "" {
|
||||||
u, err := ValidateWebhookURL(
|
u, err := url.ParseRequestURI(params.Config.MattermostWebhook)
|
||||||
params.Config.MattermostWebhook,
|
|
||||||
)
|
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, fmt.Errorf(
|
return nil, fmt.Errorf(
|
||||||
"invalid mattermost webhook URL: %w", err,
|
"invalid mattermost webhook URL: %w", err,
|
||||||
@ -167,8 +99,7 @@ func New(
|
|||||||
return svc, nil
|
return svc, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
// SendNotification sends a notification to all configured
|
// SendNotification sends a notification to all configured endpoints.
|
||||||
// endpoints.
|
|
||||||
func (svc *Service) SendNotification(
|
func (svc *Service) SendNotification(
|
||||||
ctx context.Context,
|
ctx context.Context,
|
||||||
title, message, priority string,
|
title, message, priority string,
|
||||||
@ -239,20 +170,20 @@ func (svc *Service) sendNtfy(
|
|||||||
"title", title,
|
"title", title,
|
||||||
)
|
)
|
||||||
|
|
||||||
ctx, cancel := context.WithTimeout(
|
request, err := http.NewRequestWithContext(
|
||||||
ctx, httpClientTimeout,
|
ctx,
|
||||||
)
|
http.MethodPost,
|
||||||
defer cancel()
|
topicURL.String(),
|
||||||
|
bytes.NewBufferString(message),
|
||||||
body := bytes.NewBufferString(message)
|
|
||||||
request := newRequest(
|
|
||||||
ctx, http.MethodPost, topicURL, body,
|
|
||||||
)
|
)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("creating ntfy request: %w", err)
|
||||||
|
}
|
||||||
|
|
||||||
request.Header.Set("Title", title)
|
request.Header.Set("Title", title)
|
||||||
request.Header.Set("Priority", ntfyPriority(priority))
|
request.Header.Set("Priority", ntfyPriority(priority))
|
||||||
|
|
||||||
resp, err := svc.transport.RoundTrip(request)
|
resp, err := svc.client.Do(request) //nolint:gosec // URL validated at Service construction time
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return fmt.Errorf("sending ntfy request: %w", err)
|
return fmt.Errorf("sending ntfy request: %w", err)
|
||||||
}
|
}
|
||||||
@ -261,8 +192,7 @@ func (svc *Service) sendNtfy(
|
|||||||
|
|
||||||
if resp.StatusCode >= httpStatusClientError {
|
if resp.StatusCode >= httpStatusClientError {
|
||||||
return fmt.Errorf(
|
return fmt.Errorf(
|
||||||
"%w: status %d",
|
"%w: status %d", ErrNtfyFailed, resp.StatusCode,
|
||||||
ErrNtfyFailed, resp.StatusCode,
|
|
||||||
)
|
)
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -302,11 +232,6 @@ func (svc *Service) sendSlack(
|
|||||||
webhookURL *url.URL,
|
webhookURL *url.URL,
|
||||||
title, message, priority string,
|
title, message, priority string,
|
||||||
) error {
|
) error {
|
||||||
ctx, cancel := context.WithTimeout(
|
|
||||||
ctx, httpClientTimeout,
|
|
||||||
)
|
|
||||||
defer cancel()
|
|
||||||
|
|
||||||
svc.log.Debug(
|
svc.log.Debug(
|
||||||
"sending webhook notification",
|
"sending webhook notification",
|
||||||
"url", webhookURL.String(),
|
"url", webhookURL.String(),
|
||||||
@ -325,19 +250,22 @@ func (svc *Service) sendSlack(
|
|||||||
|
|
||||||
body, err := json.Marshal(payload)
|
body, err := json.Marshal(payload)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return fmt.Errorf(
|
return fmt.Errorf("marshaling webhook payload: %w", err)
|
||||||
"marshaling webhook payload: %w", err,
|
|
||||||
)
|
|
||||||
}
|
}
|
||||||
|
|
||||||
request := newRequest(
|
request, err := http.NewRequestWithContext(
|
||||||
ctx, http.MethodPost, webhookURL,
|
ctx,
|
||||||
|
http.MethodPost,
|
||||||
|
webhookURL.String(),
|
||||||
bytes.NewBuffer(body),
|
bytes.NewBuffer(body),
|
||||||
)
|
)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("creating webhook request: %w", err)
|
||||||
|
}
|
||||||
|
|
||||||
request.Header.Set("Content-Type", "application/json")
|
request.Header.Set("Content-Type", "application/json")
|
||||||
|
|
||||||
resp, err := svc.transport.RoundTrip(request)
|
resp, err := svc.client.Do(request) //nolint:gosec // URL validated at Service construction time
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return fmt.Errorf("sending webhook request: %w", err)
|
return fmt.Errorf("sending webhook request: %w", err)
|
||||||
}
|
}
|
||||||
|
|||||||
@ -1,100 +0,0 @@
|
|||||||
package notify_test
|
|
||||||
|
|
||||||
import (
|
|
||||||
"testing"
|
|
||||||
|
|
||||||
"sneak.berlin/go/dnswatcher/internal/notify"
|
|
||||||
)
|
|
||||||
|
|
||||||
func TestValidateWebhookURLValid(t *testing.T) {
|
|
||||||
t.Parallel()
|
|
||||||
|
|
||||||
tests := []struct {
|
|
||||||
name string
|
|
||||||
input string
|
|
||||||
wantURL string
|
|
||||||
}{
|
|
||||||
{
|
|
||||||
name: "valid https URL",
|
|
||||||
input: "https://hooks.slack.com/T00/B00",
|
|
||||||
wantURL: "https://hooks.slack.com/T00/B00",
|
|
||||||
},
|
|
||||||
{
|
|
||||||
name: "valid http URL",
|
|
||||||
input: "http://localhost:8080/webhook",
|
|
||||||
wantURL: "http://localhost:8080/webhook",
|
|
||||||
},
|
|
||||||
{
|
|
||||||
name: "https with query",
|
|
||||||
input: "https://ntfy.sh/topic?auth=tok",
|
|
||||||
wantURL: "https://ntfy.sh/topic?auth=tok",
|
|
||||||
},
|
|
||||||
}
|
|
||||||
|
|
||||||
for _, tt := range tests {
|
|
||||||
t.Run(tt.name, func(t *testing.T) {
|
|
||||||
t.Parallel()
|
|
||||||
|
|
||||||
got, err := notify.ValidateWebhookURL(tt.input)
|
|
||||||
if err != nil {
|
|
||||||
t.Fatalf("unexpected error: %v", err)
|
|
||||||
}
|
|
||||||
|
|
||||||
if got.String() != tt.wantURL {
|
|
||||||
t.Errorf(
|
|
||||||
"got %q, want %q",
|
|
||||||
got.String(), tt.wantURL,
|
|
||||||
)
|
|
||||||
}
|
|
||||||
})
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
func TestValidateWebhookURLInvalid(t *testing.T) {
|
|
||||||
t.Parallel()
|
|
||||||
|
|
||||||
invalid := []struct {
|
|
||||||
name string
|
|
||||||
input string
|
|
||||||
}{
|
|
||||||
{"ftp scheme", "ftp://example.com/file"},
|
|
||||||
{"file scheme", "file:///etc/passwd"},
|
|
||||||
{"empty string", ""},
|
|
||||||
{"no scheme", "example.com/webhook"},
|
|
||||||
{"no host", "https:///path"},
|
|
||||||
}
|
|
||||||
|
|
||||||
for _, tt := range invalid {
|
|
||||||
t.Run(tt.name, func(t *testing.T) {
|
|
||||||
t.Parallel()
|
|
||||||
|
|
||||||
got, err := notify.ValidateWebhookURL(tt.input)
|
|
||||||
if err == nil {
|
|
||||||
t.Errorf(
|
|
||||||
"expected error for %q, got %v",
|
|
||||||
tt.input, got,
|
|
||||||
)
|
|
||||||
}
|
|
||||||
})
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
func TestIsAllowedScheme(t *testing.T) {
|
|
||||||
t.Parallel()
|
|
||||||
|
|
||||||
if !notify.IsAllowedScheme("https") {
|
|
||||||
t.Error("https should be allowed")
|
|
||||||
}
|
|
||||||
|
|
||||||
if !notify.IsAllowedScheme("http") {
|
|
||||||
t.Error("http should be allowed")
|
|
||||||
}
|
|
||||||
|
|
||||||
if notify.IsAllowedScheme("ftp") {
|
|
||||||
t.Error("ftp should not be allowed")
|
|
||||||
}
|
|
||||||
|
|
||||||
if notify.IsAllowedScheme("") {
|
|
||||||
t.Error("empty scheme should not be allowed")
|
|
||||||
}
|
|
||||||
}
|
|
||||||
85
internal/resolver/resolver_integration_test.go
Normal file
85
internal/resolver/resolver_integration_test.go
Normal file
@ -0,0 +1,85 @@
|
|||||||
|
//go:build integration
|
||||||
|
|
||||||
|
package resolver_test
|
||||||
|
|
||||||
|
import (
|
||||||
|
"context"
|
||||||
|
"log/slog"
|
||||||
|
"os"
|
||||||
|
"strings"
|
||||||
|
"testing"
|
||||||
|
"time"
|
||||||
|
|
||||||
|
"github.com/stretchr/testify/assert"
|
||||||
|
"github.com/stretchr/testify/require"
|
||||||
|
|
||||||
|
"sneak.berlin/go/dnswatcher/internal/resolver"
|
||||||
|
)
|
||||||
|
|
||||||
|
// Integration tests hit real DNS servers. Run with:
|
||||||
|
// go test -tags integration -timeout 60s ./internal/resolver/
|
||||||
|
|
||||||
|
func newIntegrationResolver(t *testing.T) *resolver.Resolver {
|
||||||
|
t.Helper()
|
||||||
|
|
||||||
|
log := slog.New(slog.NewTextHandler(
|
||||||
|
os.Stderr,
|
||||||
|
&slog.HandlerOptions{Level: slog.LevelDebug},
|
||||||
|
))
|
||||||
|
|
||||||
|
return resolver.NewFromLogger(log)
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestIntegration_FindAuthoritativeNameservers(
|
||||||
|
t *testing.T,
|
||||||
|
) {
|
||||||
|
t.Parallel()
|
||||||
|
|
||||||
|
r := newIntegrationResolver(t)
|
||||||
|
|
||||||
|
ctx, cancel := context.WithTimeout(
|
||||||
|
context.Background(), 30*time.Second,
|
||||||
|
)
|
||||||
|
defer cancel()
|
||||||
|
|
||||||
|
nameservers, err := r.FindAuthoritativeNameservers(
|
||||||
|
ctx, "example.com",
|
||||||
|
)
|
||||||
|
require.NoError(t, err)
|
||||||
|
require.NotEmpty(t, nameservers)
|
||||||
|
|
||||||
|
t.Logf("example.com NS: %v", nameservers)
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestIntegration_ResolveIPAddresses(t *testing.T) {
|
||||||
|
t.Parallel()
|
||||||
|
|
||||||
|
r := newIntegrationResolver(t)
|
||||||
|
|
||||||
|
ctx, cancel := context.WithTimeout(
|
||||||
|
context.Background(), 30*time.Second,
|
||||||
|
)
|
||||||
|
defer cancel()
|
||||||
|
|
||||||
|
// sneak.cloud is on Cloudflare
|
||||||
|
nameservers, err := r.FindAuthoritativeNameservers(
|
||||||
|
ctx, "sneak.cloud",
|
||||||
|
)
|
||||||
|
require.NoError(t, err)
|
||||||
|
require.NotEmpty(t, nameservers)
|
||||||
|
|
||||||
|
hasCloudflare := false
|
||||||
|
|
||||||
|
for _, ns := range nameservers {
|
||||||
|
if strings.Contains(ns, "cloudflare") {
|
||||||
|
hasCloudflare = true
|
||||||
|
|
||||||
|
break
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
assert.True(t, hasCloudflare,
|
||||||
|
"sneak.cloud should be on Cloudflare, got: %v",
|
||||||
|
nameservers,
|
||||||
|
)
|
||||||
|
}
|
||||||
File diff suppressed because it is too large
Load Diff
Loading…
Reference in New Issue
Block a user